Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs | IEEE Conference Publication | IEEE Xplore